Posted
by
samzenpus
on Monday June 04, 2012 @03:48PM
from the protect-ya-neck dept.

Trailrunner7 writes "Google's Android platform has become the most popular mobile operating system both among consumers and malware writers, and the company earlier this year introduced the Bouncer system to look for malicious apps in the Google Play market. Bouncer, which checks for malicious apps and known malware, is a good first step, but as new work from researchers Jon Oberheide and Charlie Miller shows, it can be bypassed quite easily and in ways that will be difficult for Google to address in the long term. Oberheide and Miller, both well-known for their work on mobile security, went into their research without much detailed knowledge of how the Bouncer system works. Google has said little publicly about its capabilities, preferring not to give attackers any insights into the system's inner workings. So Oberheide and Miller looked at it as a challenge, an exercise to see how much they could deduce about Bouncer from the outside, and, as it turns out, the inside."

Posted
by
samzenpus
on Monday June 04, 2012 @08:36AM
from the signing-dirty dept.

wiredmikey writes "Microsoft disclosed that 'unauthorized digital certificates derived from a Microsoft Certificate Authority' were used to sign components of the recently discovered Flame malware. 'We have discovered through our analysis that some components of the malware have been signed by certificates that allow software to appear as if it was produced by Microsoft,' Microsoft Security Response Center's Jonathan Ness wrote in a blog post. Microsoft is also warning that the same techniques could be leveraged by less sophisticated attackers to conduct more widespread attacks. In response to the discovery, Microsoft released a security advisory detailing steps that organizations should take in order block software signed by the unauthorized certificates, and also released an update to automatically protect customers. Also as part of its response effort, Microsoft said its Terminal Server Licensing Service no longer issues certificates that allow code to be signed."

Posted
by
timothy
on Monday June 04, 2012 @07:05AM
from the doesn't-say-much-good-for-their-product dept.

Hugh Pickens writes "Mikko Hypponen, Chief Research Officer of software security company F-Secure, writes that when his company heard about Flame, they went digging through their archive for related samples of malware and were surprised to find that they already had samples of Flame, dating back to 2010 and 2011, that they were unaware they possessed. 'What this means is that all of us had missed detecting this malware for two years, or more. That's a spectacular failure for our company, and for the antivirus industry in general.' Why weren't Flame, Stuxnet, and Duqu detected earlier? The answer isn't encouraging for the future of cyberwar. All three were most likely developed by a Western intelligence agency as part of covert operations that weren't meant to be discovered and the fact that the malware evaded detection proves how well the attackers did their job. In the case of Stuxnet and DuQu, they used digitally signed components to make their malware appear to be trustworthy applications and instead of trying to protect their code with custom packers and obfuscation engines — which might have drawn suspicion to them — they hid in plain sight. In the case of Flame, the attackers used SQLite, SSH, SSL and LUA libraries that made the code look more like a business database system than a piece of malware. 'The truth is, consumer-grade antivirus products can't protect against targeted malware created by well-resourced nation-states with bulging budgets,' writes Hypponen, adding that it's highly likely there are other similar attacks already underway that we haven't detected yet because simply put, attacks like these work. 'Flame was a failure for the antivirus industry. We really should have been able to do better. But we didn't. We were out of our league, in our own game.'"

Posted
by
timothy
on Monday June 04, 2012 @01:20AM
from the connected-vending-machines-in-the-lobby dept.

An anonymous reader writes "I am on a committee to evaluate internet options for a medium sized condo association (80 units — 20 stories) in a major metropolitan area (Chicago). What options are out there? What questions should one ask of the various sales representatives? How should access be distributed within the building (wireless APs, ethernet cable). Does it make sense to provide any additional condo wide infrastructure (servers, services)? How much should it cost? How much dedicated bandwidth is required to support a community of this size?"

Posted
by
timothy
on Sunday June 03, 2012 @10:35PM
from the spellchecker-hates-it dept.

chrb writes "Nintendo has announced that its new Wii U console will feature a social network called the Miiverse in which users can video chat, see what others are playing, share game content and swap tips." And with a nod to Zawinski's Law, "The redesigned Wii U GamePad features dual sticks, a touch screen that supports finger and stylus interaction, motion and gyroscope sensors, and the ability to act as a TV remote. The Wii U GamePad has its own dedicated Web browser and can share images and video to a TV so that everyone can enjoy the shared content."

Posted
by
timothy
on Sunday June 03, 2012 @10:40AM
from the oh-the-humanity dept.

MojoKid writes "Recently AMD announced that it would cease offering monthly graphics driver updates, and instead issue Catalyst versions only 'when it makes sense.' That statement would be a good deal more comforting if it didn't 'make sense' to upgrade AMD's drivers nearly every single month. From 2010 through 2011, AMD released a new Catalyst driver every month like clockwork. Starting last summer, however, AMD began having trouble with high-profile game releases that performed badly or had visual artifacts. Rage was one high-profile example, but there have been launch-day issues with a number of other titles, including Skyrim, Assassin's Creed, Bat Man: Arkham City, and Battlefield 3. The company responded to these problems by quickly releasing out-of-band driver updates. In addition, AMD's recent Catalyst 12.6 beta driver also fixes random BSODs on the desktop, poor Crossfire scaling in Skyrim and random hangs in Crysis 2 in DX9. In other words, AMD is still working to resolve important problems in games that launched more than six months ago. It's hard to put a positive spin on slower driver releases given just how often those releases are necessary."

Posted
by
timothy
on Sunday June 03, 2012 @02:50AM
from the nefarious-evildoers dept.

coondoggie writes "The nasty Trojan known as Citadel malware, which is based on Zeus, has typically been used to extort money from online banking users, but a new variant is making the rounds that tries to get your money by saying you looked at child porn sites and must pay a violation fee to the U.S. Department of Justice. This variation, called Reveton, lures the victim to a drive-by download website, at which time the ransomware is installed on the user's computer, says the U.S. Internet Crime Complaint Center (IC3). Once installed, the computer freezes and a screen is displayed warning the user they have violated United States Federal Law."

Posted
by
timothy
on Saturday June 02, 2012 @12:29PM
from the as-many-characters-as-the-post-it-will-hold dept.

McGruber writes "Joseph Bonneau, a computer scientist at the University of Cambridge, calculated the password strengths of nearly 70 million Yahoo! users. He compared the strengths of passwords chosen by different demographic groups and compared the results. People over the age of 55 pick passwords double the strength of those chosen by people under 25 years old." Does this mean that the younger users are more cavalier and naive, or are they simply more cynical about the actual value of strong passwords in the era of large-scale user-database compromises?

Posted
by
timothy
on Saturday June 02, 2012 @11:32AM
from the binary-code-of-ells-and-zeroes dept.

judgecorp writes "Google has applied for the .lol domain in ICANN's sale of generic top level domains (gTLDs). Google also asked for .google, .docs, and .youtube at a cost of $185,000 each, in the round of applications which has finally closed. A glitch in the application system may have leaked some of the applicants' data to other applicants."

Posted
by
timothy
on Saturday June 02, 2012 @05:42AM
from the if-they-can-why-can't-texas? dept.

New submitter lsatenstein writes with this snippet from The H:"The regional government of Spain's Basque Country has decreed that all software produced for Basque government agencies and public bodies should be open sourced. Joinup, the European Commission's open source web site, cites an article in Spanish newspaper El Pais [English translation], saying that the only exceptions will be software that directly affects state security and a handful of projects which are being conducted in conjunction with commercial software suppliers."

Posted
by
Soulskill
on Friday June 01, 2012 @03:10PM
from the guns-don't-kill-people,-except-when-they-do dept.

Bob the Super Hamste writes "The BBC is reporting on a new law in Venezuela that effectively bans the commercial sale of firearms and ammunition to private citizens. Previously anyone with a permit could purchase a firearm from any commercial vendor but now only the police, military, and security firms will be able to purchase firearms or ammunition from only state-owned manufactures or importers. Hugo Chavez's government states that the goal is to eventually disarm the citizenry. The law, which went into effect today, was passed on February 29th, and up to this point the government has been running an amnesty program allowing citizens to turn in their illegal firearms. Since the law was first passed, 805,000 rounds of ammunition have been recovered from gun dealers. The measure is intended to curb violent crime in Venezuela, where 78% of homicides are linked to firearms."

Posted
by
Soulskill
on Friday June 01, 2012 @02:47PM
from the measured-in-dollars-and-annoying-calls-from-relatives dept.

blackbearnh writes "Everyone these days knows that you have to double- and triple-check your code for security vulnerabilities, and make sure your servers are locked down as tight as you can. But why? Because our underlying operating systems, languages, and platforms do such a crappy job of protecting us from ourselves. The inevitable result of clamoring for new features, rather than demanding rock-solid infrastructure, is that the developer community wastes huge amounts of time protecting their applications from exploits that should never be possible in the first place. The next time you hear about a site that gets pwned by a buffer overrun exploit, don't think 'stupid developers!', think 'stupid industry!'"

Posted
by
Soulskill
on Friday June 01, 2012 @11:18AM
from the stop-or-i'll-say-stop-again dept.

An anonymous reader writes "As Microsoft released the preview of the next version of its Internet Explorer browser, news that in Windows 8 the browser will be sending a 'Do Not Track' signal to Web sites by default must have shaken online advertising giants. 'Consumers can change this default setting if they choose,' Microsoft noted, but added that this decision reflects their commitment to providing Windows customers an experience that is 'private by default' in an era when so much user data is collected online.' This step will make Internet Explorer 10 the first web browser with DNT on by default. And while the websites are not required to comply with the users' do-not-track request, the DNT initiative — started by the U.S. Federal Trade Commission — is making good progress."

Posted
by
Soulskill
on Friday June 01, 2012 @07:45AM
from the cyber-bombshell dept.

diewlasing sends this excerpt from the NY Times:
"From his first months in office, President Obama secretly ordered increasingly sophisticated attacks on the computer systems that run Iran's main nuclear enrichment facilities, significantly expanding America's first sustained use of cyberweapons, according to participants in the program. Mr. Obama decided to accelerate the attacks — begun in the Bush administration and code-named Olympic Games — even after an element of the program accidentally became public in the summer of 2010 because of a programming error that allowed it to escape Iran's Natanz plant and sent it around the world on the Internet. Computer security experts who began studying the worm, which had been developed by the United States and Israel, gave it a name: Stuxnet."

Posted
by
samzenpus
on Thursday May 31, 2012 @09:07PM
from the protect-ya-neck dept.

Trailrunner7 writes in with a story about a iOS security guide released by Apple. "Apple has released a detailed security guide for its iOS operating system, an unprecedented move for a company known for not discussing the technical details of its products, let alone the security architecture. The document lays out the system architecture, data protection capabilities and network security features in iOS, most of which had been known before but hadn't been publicly discussed by Apple. The iOS Security guide (PDF), released within the last week, represents Apple's first real public documentation of the security architecture and feature set in iOS, the operating system that runs on iPhones, iPads and iPod Touch devices. Security researchers have been doing their best to reverse engineer the operating system for several years and much of what's in the new Apple guide has been discussed in presentations and talks by researchers. 'Apple doesn't really talk about their security mechanisms in detail. When they introduced ASLR, they didn't tell anybody. They didn't ever explain how codesigning worked,' security researcher Charlie Miller said."